Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
[event time <date: time> event number <value>: machine abc.FQDN: response time <date: time>]
The Job Server started to purge expired logs if there are any.
|English: Request a translation of the event description in plain English.|
In Inculate6.0 you can change the view from "local scan" to "view log" or "view Administrator options". If you change to "view log" it is possible to configure Inoculate to purge old logs if they are older than n days. This Service should be the reason for event id 1.
|Private comment: Subscribers only. See example of private comment|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
Send comments or solutions
- Notify me when updated